Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 11 of 11

Full-Text Articles in Business

Triangulating System Requirements For Users With Severe Motor Disabilities, Adriane Randolph Aug 2014

Triangulating System Requirements For Users With Severe Motor Disabilities, Adriane Randolph

Adriane B. Randolph

By giving a voice to users in the design process of information systems, they often feel more empowered and engaged. The inclusion of users with disabilities in the design process, however, can be markedly more difficult. User profiling allows a user's preferences and interests to be captured and represented. However, for a user with severe motor disabilities, information related to his or her user profile must be obtained through a variety of means. Because feedback from a person with a severe motor disability may be limited and, at times, unreliable, system requirements must be triangulated using multiple sources to help …


Personality And Programming, Amy B. Woszczynski, Tracy C. Guthrie, Sherri Shade Jun 2014

Personality And Programming, Amy B. Woszczynski, Tracy C. Guthrie, Sherri Shade

Sherri Shade

Information systems students continue to struggle to successfully complete computer programming classes. Learning how to program is difficult, and failure and attrition rates in college level programming classes remain at an unacceptably high rate. Since many IS students take a programming course as part of their program of study, IS educators should better understand why IS students tend to achieve low success rates in programming courses and what can be done to improve success rates. Little research to date has addressed potential reasons for student failure in programming principles courses. Many educators simply assume that high failure rates are acceptable …


A Call To Is Educators To Respond To The Voices Of Women In Information Security, Amy B. Woszczynski, Sherri Shade Jun 2014

A Call To Is Educators To Respond To The Voices Of Women In Information Security, Amy B. Woszczynski, Sherri Shade

Sherri Shade

Much prior research has examined the dearth of women in the IT industry. The purpose of this study is to examine the perceptions of women in IT within the context of information security and assurance. This paper describes results from a study of a relatively new career path to see if there are female-friendly opportunities that have not existed in previous IT career paths. Research methodology focuses on a qualitative analysis of in-depth interviews with women who are self-described information security professionals. A primary goal of the study is to understand the perceptions of women in information security and determine …


Assessing Relative Weights Of Authentication Components: An Expert Panel Approach, Herbert J. Mattord, Yair Levy, Steven Furnell May 2014

Assessing Relative Weights Of Authentication Components: An Expert Panel Approach, Herbert J. Mattord, Yair Levy, Steven Furnell

Herbert J. Mattord

Organizations rely on password-based authentication methods to control access to many Web-based systems. In a recent study, we developed a benchmarking instrument to assess the authentication methods used in these contexts. Our instrument developed included extensive literature foundation and an expert panel assessment. This paper reports on the development of the instrument and the expert panel assessment. The initial draft of the instrument was derived from literature to assess 1) password strength requirements, 2) password usage methods, and 3) password reset requirements. Following, the criteria within the index were evaluated by an expert panel and the same panel provided opinions …


Making Users Mindful Of It Security, Michael Whitman, Herbert Mattord May 2014

Making Users Mindful Of It Security, Michael Whitman, Herbert Mattord

Herbert J. Mattord

The article discusses ways to make users mindful of Information Technology (IT) security. Security awareness programs ensure that employees understand the importance of security and the adverse consequences of its failure; they also remind users of the procedures to be followed. Awareness training is vital to keeping the idea of IT security uppermost in employees' minds. While federal agencies in the U.S. are required to train employees in computer security awareness, such training is voluntary in the private sector. It is, however, no less vital. Every company should integrate a security awareness program into the IT training program.


Infosec Policy - The Basis For Effective Security Programs, Herbert Mattord, Michael Whitman May 2014

Infosec Policy - The Basis For Effective Security Programs, Herbert Mattord, Michael Whitman

Herbert J. Mattord

The success of any information security program lies in policy development. The lack of success in any particular program can often be attributed to this unmet need to build the foundation for success. In 1989, the National Institute of Standards and Technology addressed this point in Special Publication SP 500-169: Executive Guide to the Protection of Information Resources (1989): The success of an information resources protection program depends on the policy generated, and on the attitude of management toward securing information on automated systems. You, the policy maker, set the tone and the emphasis on how important a role information …


It Project Managers' Perceptions And Use Of Virtual Team Technologies, Catherine Beise, Fred Niederman, Herbert Mattord May 2014

It Project Managers' Perceptions And Use Of Virtual Team Technologies, Catherine Beise, Fred Niederman, Herbert Mattord

Herbert J. Mattord

This paper presents the results of a case study pertaining to the use of information and communication media to support a range of project management tasks. A variety of electronic communication tools have evolved to support collaborative work and virtual teams. Few of these tools have focused specifically on the needs of project managers. In an effort to learn how practicing IT project managers employ these tools, data were collected at a North American Fortune 500 industrial company via interviews with IT project managers regarding their use and perceptions of electronic media within the context of their work on project …


Factors Of Password-Based Authentication, Herbert J. Mattord, Yair Levy, Steven Furnell May 2014

Factors Of Password-Based Authentication, Herbert J. Mattord, Yair Levy, Steven Furnell

Herbert J. Mattord

Organizations continue to rely on password-based authentication methods to control access to many Web-based systems. This research study developed a benchmarking instrument intended to assess authentication methods used in Web-based information systems (IS. This approach explored how authentication practices can be measured in three component areas: 1) password strength requirements, 2) password usage methods, and 3) password reset requirements. This report explores the criteria that are required to define these component areas.


The Impact Of Operating System Obsolescence On The Life Cycle Of Distributed Teams, Herbert J. Mattord, Tridib Bandyopadhyay May 2014

The Impact Of Operating System Obsolescence On The Life Cycle Of Distributed Teams, Herbert J. Mattord, Tridib Bandyopadhyay

Herbert J. Mattord

Operating System obsolescence is widely considered an important factor when architectural choices are made during the planning phase of systems development and maintenance. In this work, we seek to understand the importance that planners actually ascribe to this attribute in practice, and ask probing questions to the managers, developers, and analysts of systems in industry in the form of a survey. Initial results suggest that obsolescence is neither perceived as a critical factor during planning for systems development, nor is it viewed as a major contributor to the total cost of operation of client/server systems. However, the survey does identify …


Social Media Assimilation In Firms: Investigating The Roles Of Absorptive Capacity And Institutional Pressures, Pratyush Bharati, Chen Zhang, Abhijit Chaudhury Apr 2014

Social Media Assimilation In Firms: Investigating The Roles Of Absorptive Capacity And Institutional Pressures, Pratyush Bharati, Chen Zhang, Abhijit Chaudhury

Management Science and Information Systems Faculty Publication Series

Firms are increasingly employing social media to manage relationships with partner organizations, yet the role of institutional pressures in social media assimilation has not been studied. We investigate social media assimilation in firms using a model that combines the two theoretical streams of IT adoption: organizational innovation and institutional theory. The study uses a composite view of absorptive capacity that includes both previous experience with similar technology and the general ability to learn and exploit new technologies. We find that institutional pressures are an important antecedent to absorptive capacity, an important measure of organizational learning capability. The paper augments theory …


Social Media Assimilation In Firms: Investigating The Roles Of Absorptive Capacity And Institutional Pressures, Pratyush Bharati, Chen Zhang, Abhijit Chaudhury Mar 2014

Social Media Assimilation In Firms: Investigating The Roles Of Absorptive Capacity And Institutional Pressures, Pratyush Bharati, Chen Zhang, Abhijit Chaudhury

Pratyush Bharati

Firms are increasingly employing social media to manage relationships with partner organizations, yet the role of institutional pressures in social media assimilation has not been studied. We investigate social media assimilation in firms using a model that combines the two theoretical streams of IT adoption: organizational innovation and institutional theory. The study uses a composite view of absorptive capacity that includes both previous experience with similar technology and the general ability to learn and exploit new technologies. We find that institutional pressures are an important antecedent to absorptive capacity, an important measure of organizational learning capability. The paper augments theory …